• The system must provide security and control access to those functions based on permissions.

    系统必须提供安全性根据相应的权限控制这些功能访问

    youdao

  • These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.

    这些操作可以安全配置更改密钥证书管理访问控制策略更改、总线其他系统资源管理等等

    youdao

  • Unlike customization, which we will discuss in a minute, security is based on policies created by system administrators to enforce corporate and departmental defined access controls.

    自定义不同,我们立即讨论安全性安全性系统管理员创建的,用于执行企业部门定义访问控制。

    youdao

  • It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.

    务必考虑系统每个层次可能访问路径同时还要考虑授权如何其他安全功能(网络级别保护)集成

    youdao

  • The V8 security system can then fetch the security callback of the object being accessed and call it to ask if another context is allowed to access it.

    V8安全系统可以获取访问对象安全回调函数并且调用判断是否允许另外一个context访问它。

    youdao

  • You can do so by limiting access to the commands that can affect them, and also through command resource security. Here are some considerations for SYSTEM resources.

    为此可以限制对可能影响它们命令访问或者可以通过命令资源安全性提供保护。

    youdao

  • Too little security, and your only defense system will be thwarted and allow full access to everything inside that checkpoint.

    如果安全措施太少唯一防御系统失效,从而外人能够访问检查点之后的所有数据。

    youdao

  • Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.

    同样如果系统侵入并受到破坏,那么数据库数据库访问信息存储正在运行Web服务器机器上会引发安全性问题

    youdao

  • By using access control matrix, we can achieve the real time and dynamic control of task, which ensures the system security.

    通过引入访问控制矩阵实现了对任务实时、动态控制,从而确保了系统的安全。

    youdao

  • Then, this paper deeply investigated the three difficult problems of the system, such as exception handling, security right controlling and heterogeneous database access.

    然后系统三个难点问题——异常处理安全权限控制异构数据库访问进行了深入的研究。

    youdao

  • This paper analyzes the security mechanism of SYBASE database management system and the model of Role-based Access Control.

    文章分析了SYBASE数据库管理系统安全控制机制基于角色数据访问控制模型

    youdao

  • NET has constructed the school information management system, introduced the system overall design. The database access method and the data security guard measure.

    NET构建了学校信息管理系统本文介绍系统的整体设计数据库访问方法数据安全防范措施

    youdao

  • A database security access proxy system can solve these problems and it is easy to join it into information system without increasing any complication in system.

    采用数据库安全访问代理系统可以解决上述安全问题并且容易加入信息系统中而不增加系统的复杂性。

    youdao

  • Integration of rural credit cooperatives' credit management system, the generic data access interface and security control implementation of the three-tier framework are analysed and researched.

    结合农村信用社信贷管理系统,对三层构架中的通用数据访问接口安全控制实现进行了分析研究

    youdao

  • The architecture of access control model is independent of the implementation, which makes the system be able to adapt to various security requirements and dynamic changes.

    系统访问控制框架的结构与具体实现方法无关能够满足群应用的不同安全要求以及动态安全性要求的变化。

    youdao

  • The structure of the system, mail service protocols, mode of messaging, allocation of mailboxes as well as personal security for authentication and access control measures are discussed in this paper.

    文中论述系统结构邮递服务协议、邮递方式信箱的管理信件的保密存取控制手段等问题。

    youdao

  • The system meets the demands of uniform authorization and access control, possessing the merits of good security, high flexible and easy to management.

    系统满足统一授权访问控制需求具有安全性灵活性便于管理等特点

    youdao

  • The secure operating system is the base of information system security, and access control is a significant secure mechanism of operating system.

    操作系统安全信息系统安全基石访问控制则是操作系统安全机制重要内容。

    youdao

  • It made information system, from access system to operate database and sign badge, all these things under security control.

    使该所信息系统用户访问系统,操作数据库具体实现签章等工作,处在系统安全控制之下。

    youdao

  • The thesis also analyses the design plan of system database, including its security, transaction management and ADO data access technology.

    然后,论文论述了系统数据库设计过程,其中包括安全性设计、事务管理设计以及ADO数据访问技术的分析及运用。

    youdao

  • Together with the technology of Access Control, redundant backup recovery and network security, it makes an allround security system.

    设置用户存取权限控制冗余备份恢复网络安全等多种安全策略共同建立有机的安全体系

    youdao

  • Disabling code access security makes the system vulnerable to attacks by malicious code such as viruses and worms.

    禁用代码访问安全性使系统容易受到恶意代码(病毒蠕虫)的攻击

    youdao

  • The paper mainly introduces the components and the related technology of network security access control system and explores the application of this technology on railway information system.

    主要介绍网络安全准入控制系统组成相关技术技术铁路信息系统中如何应用加以探讨

    youdao

  • This paper introduces the basic concept and model of access security control of the database system in a multiuser information system. It also describes its concrete implementation.

    本文介绍了用户信息系统数据库安全性控制基本概念控制模型,以及在多用户信息系统中安全性控制的实现方法

    youdao

  • There are two aspects included in database system security, which is access control security strategy and communication channel security.

    数据库系统安全性主要包括两个方面访问控制策略传输通道安全

    youdao

  • This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.

    一方面网络系统实施有效安全管理,做好网络数据备份网络用户的管理项工作。

    youdao

  • At load time, the code access security system examines all policy levels and the resulting permission grant is the intersection of all allowed permissions in each level.

    载入时间程序存取安全系统会检查所有原则层级产生使用权限授权每一个层级所有允许使用权限交集

    youdao

  • The Role determines security and access a user who has this Role will have in the System.

    角色决定安全性以及含有角色用户所具有的系统访问权限

    youdao

  • Recent years, authentication based on the digital certificate and role-based access controls have features of safe and flexibility that enhance system security very prospect.

    近几年产生基于数字证书认证基于角色访问控制具有安全性高、管理灵活特征对于加强系统安全性有应用前景

    youdao

  • Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.

    实现信息系统安全目标,需要系统能够提供相关安全服务身份标识认证服务、授权访问控制服务、非否认服务、机密性服务、完整性服务。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定